Canary – An Open Source Decoy

Before we start to configure our decoys and put it in our production environment, let’s take a look at what exactly it is and how it differs from the usual honeypot. Honeypots are vulnerable systems configured to lure the attacker who is present in an organization. This attacker need not be from outside the environment. Read More…

Article Link: http://niiconsulting.com/checkmate/2017/05/canary-an-open-source-decoy/